{"id":6491,"date":"2025-09-09T22:01:56","date_gmt":"2025-09-09T22:01:56","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=6491"},"modified":"2025-09-09T22:01:56","modified_gmt":"2025-09-09T22:01:56","slug":"microsoft-patch-tuesday-september-2025-version-krebs-on-safety","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=6491","title":{"rendered":"Microsoft Patch Tuesday, September 2025 Version \u2013 Krebs on Safety"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><strong>Microsoft Corp.<\/strong> in the present day issued safety updates to repair greater than 80 vulnerabilities in its <strong>Home windows<\/strong> working techniques and software program. There aren&#8217;t any identified \u201czero-day\u201d or actively exploited vulnerabilities on this month\u2019s bundle from Redmond, which however consists of patches for 13 flaws that earned Microsoft\u2019s most-dire \u201cessential\u201d label. In the meantime, each <strong>Apple<\/strong> and <strong>Google<\/strong> not too long ago launched updates to repair zero-day bugs of their units.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-60331\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate.png\" alt=\"\" width=\"750\" height=\"496\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate.png 923w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate-768x508.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2022\/07\/winupdatedate-782x518.png 782w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\"\/><\/p>\n<p>Microsoft assigns safety flaws a \u201cessential\u201d ranking when malware or miscreants can exploit them to realize distant entry to a Home windows system with little or no assist from customers. Among the many extra regarding essential bugs quashed this month is <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-54918\" target=\"_blank\" rel=\"noopener\">CVE-2025-54918<\/a>. The issue right here resides with <strong>Home windows NTLM<\/strong>, or NT LAN Supervisor, a collection of code for managing authentication in a Home windows community atmosphere.<\/p>\n<p>Redmond charges this flaw as \u201cExploitation Extra Seemingly,\u201d and though it&#8217;s listed as a privilege escalation vulnerability, <strong>Kev Breen<\/strong> at <strong>Immersive<\/strong> says this one is definitely exploitable over the community or the Web.<\/p>\n<p>\u201cFrom Microsoft\u2019s restricted description, it seems that if an attacker is ready to ship specifically crafted packets over the community to the goal machine, they&#8217;d have the power to realize SYSTEM-level privileges on the goal machine,\u201d Breen mentioned. \u201cThe patch notes for this vulnerability state that \u2018Improper authentication in Home windows NTLM permits a certified attacker to raise privileges over a community,\u2019 suggesting an attacker could already have to have entry to the NTLM hash or the person\u2019s credentials.\u201d<\/p>\n<p>Breen mentioned one other patch \u2014 <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-55234\" target=\"_blank\" rel=\"noopener\">CVE-2025-55234<\/a>, a 8.8 CVSS-scored flaw affecting the <strong>Home windows SMB<\/strong> consumer for sharing recordsdata throughout a community \u2014 is also listed as privilege escalation bug however is likewise remotely exploitable. This vulnerability was publicly disclosed previous to this month.<\/p>\n<p>\u201cMicrosoft says that an attacker with community entry would be capable of carry out a replay assault towards a goal host, which might consequence within the attacker gaining further privileges, which might result in code execution,\u201d Breen famous.<span id=\"more-72086\"\/><\/p>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-54916\" target=\"_blank\" rel=\"noopener\">CVE-2025-54916<\/a> is an \u201cnecessary\u201d vulnerability in <strong>Home windows NTFS<\/strong> \u2014 the default filesystem for all fashionable variations of Home windows \u2014 that may result in distant code execution. Microsoft likewise thinks we&#8217;re greater than more likely to see exploitation of this bug quickly: The final time Microsoft patched an NTFS bug was in March 2025 and it was already being exploited within the wild as a zero-day.<\/p>\n<p>\u201cWhereas the title of the CVE says \u2018Distant Code Execution,\u2019 this exploit just isn&#8217;t remotely exploitable over the community, however as a substitute wants an attacker to both have the power to run code on the host or to persuade a person to run a file that will set off the exploit,\u201d Breen mentioned. \u201cThat is generally seen in social engineering assaults, the place they ship the person a file to open as an attachment or a hyperlink to a file to obtain and run.\u201d<\/p>\n<p>Essential and distant code execution bugs are inclined to steal all of the limelight, however <strong>Tenable<\/strong> Senior Workers Analysis Engineer <strong>Satnam Narang<\/strong> notes that almost half of all vulnerabilities mounted by Microsoft this month are privilege escalation flaws that require an attacker to have gained entry to a goal system first earlier than making an attempt to raise privileges.<\/p>\n<p>\u201cFor the third time this 12 months, Microsoft patched extra elevation of privilege vulnerabilities than distant code execution flaws,\u201d Narang noticed.<\/p>\n<p>On Sept. 3, Google <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/google-fixes-actively-exploited-android-flaws-in-september-update\/\" target=\"_blank\" rel=\"noopener\">mounted two flaws<\/a> that have been detected as exploited in zero-day assaults, together with\u00a0CVE-2025-38352, an elevation of privilege within the Android kernel, and CVE-2025-48543, additionally an elevation of privilege downside within the Android Runtime part.<\/p>\n<p>Additionally, Apple not too long ago patched its seventh zero-day (CVE-2025-43300) of this 12 months. It was a part of <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/techcrunch.com\/2025\/08\/29\/whatsapp-fixes-zero-click-bug-used-to-hack-apple-users-with-spyware\/\" target=\"_blank\" rel=\"noopener\">an exploit chain<\/a> used together with a vulnerability within the <strong>WhatsApp <\/strong>(CVE-2025-55177) prompt messenger to hack Apple units. Amnesty Worldwide <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/DonnchaC\/status\/1961444710620303653\" target=\"_blank\" rel=\"noopener\">studies<\/a> that the 2 zero-days have been utilized in \u201ca sophisticated adware marketing campaign\u201d over the previous 90 days. The difficulty is mounted in iOS 18.6.2, iPadOS 18.6.2, iPadOS 17.7.10, macOS Sequoia 15.6.1, macOS Sonoma 14.7.8, and macOS Ventura 13.7.8.<\/p>\n<p>The <strong>SANS Web Storm Heart<\/strong> has a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/isc.sans.edu\/forums\/diary\/Microsoft%20Patch%20Tuesday%20September%202025\/32270\/\" target=\"_blank\" rel=\"noopener\">clickable breakdown<\/a> of every particular person repair from Microsoft, listed by severity and CVSS rating. Enterprise Home windows admins concerned in testing patches earlier than rolling them out ought to control <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.askwoody.com\/2025\/september-2025-updates-are-out\/\" target=\"_blank\" rel=\"noopener\">askwoody.com<\/a>, which regularly has the thin on wonky updates.<\/p>\n<p>AskWoody additionally reminds us that we\u2019re now simply two months out from Microsoft discontinuing free safety updates for Home windows 10 computer systems. For these concerned with safely extending the lifespan and usefulness of those older machines, take a look at <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/krebsonsecurity.com\/2025\/08\/microsoft-patch-tuesday-august-2025-edition\/\" target=\"_blank\" rel=\"noopener\">final month\u2019s Patch Tuesday protection<\/a> for just a few pointers.<\/p>\n<p>As ever, please don\u2019t neglect to again up your knowledge (if not your complete system) at common intervals, and be at liberty to pontificate within the feedback in case you expertise issues putting in any of those fixes.<\/p>\n<\/p><\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Microsoft Corp. in the present day issued safety updates to repair greater than 80 vulnerabilities in its Home windows working techniques and software program. There aren&#8217;t any identified \u201czero-day\u201d or actively exploited vulnerabilities on this month\u2019s bundle from Redmond, which however consists of patches for 13 flaws that earned Microsoft\u2019s most-dire \u201cessential\u201d label. In the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":6493,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[406,262,618,1077,211,3073,1078],"class_list":["post-6491","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-edition","tag-krebs","tag-microsoft","tag-patch","tag-security","tag-september","tag-tuesday"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/6491","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6491"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/6491\/revisions"}],"predecessor-version":[{"id":6492,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/6491\/revisions\/6492"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/6493"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6491"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6491"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-06 17:31:46 UTC -->